Executive Summary

Informations
Name CVE-2024-46864 First vendor Publication 2024-09-27
Vendor Cve Last vendor Modification 2024-10-03

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Overall CVSS Score 5.5
Base Score 5.5 Environmental Score 5.5
impact SubScore 3.6 Temporal Score 5.5
Exploitabality Sub Score 1.8
 
Attack Vector Local Attack Complexity Low
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact None
Integrity Impact None Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

x86/hyperv: fix kexec crash due to VP assist page corruption

commit 9636be85cc5b ("x86/hyperv: Fix hyperv_pcpu_input_arg handling when CPUs go online/offline") introduces a new cpuhp state for hyperv initialization.

cpuhp_setup_state() returns the state number if state is CPUHP_AP_ONLINE_DYN or CPUHP_BP_PREPARE_DYN and 0 for all other states. For the hyperv case, since a new cpuhp state was introduced it would return 0. However, in hv_machine_shutdown(), the cpuhp_remove_state() call is conditioned upon "hyperv_init_cpuhp > 0". This will never be true and so hv_cpu_die() won't be called on all CPUs. This means the VP assist page won't be reset. When the kexec kernel tries to setup the VP assist page again, the hypervisor corrupts the memory region of the old VP assist page causing a panic in case the kexec kernel is using that memory elsewhere. This was originally fixed in commit dfe94d4086e4 ("x86/hyperv: Fix kexec panic/hang issues").

Get rid of hyperv_init_cpuhp entirely since we are no longer using a dynamic cpuhp state and use CPUHP_AP_HYPERV_ONLINE directly with cpuhp_remove_state().

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46864

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 8
Os 3678

Sources (Detail)

https://git.kernel.org/stable/c/2ae1beb3ab4f28868cc5d1541d05e1fbee3ad825
https://git.kernel.org/stable/c/b9af6418279c4cf73ca073f8ea024992b38be8ab
https://git.kernel.org/stable/c/d6f018a3b49d0a94ddbd0e479c2af6b19724e434
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Date Informations
2025-03-29 03:40:54
  • Multiple Updates
2025-03-28 13:45:14
  • Multiple Updates
2025-03-28 03:18:56
  • Multiple Updates
2025-03-19 03:14:15
  • Multiple Updates
2025-03-18 03:27:12
  • Multiple Updates
2025-03-14 03:14:28
  • Multiple Updates
2025-03-06 14:11:01
  • Multiple Updates
2025-02-22 03:24:35
  • Multiple Updates
2025-01-08 03:05:35
  • Multiple Updates
2025-01-07 03:05:08
  • Multiple Updates
2024-12-25 03:03:45
  • Multiple Updates
2024-12-12 03:06:42
  • Multiple Updates
2024-11-23 03:03:38
  • Multiple Updates
2024-11-22 03:01:47
  • Multiple Updates
2024-11-20 03:00:06
  • Multiple Updates
2024-11-14 03:00:25
  • Multiple Updates
2024-11-09 03:00:25
  • Multiple Updates
2024-10-26 02:57:47
  • Multiple Updates
2024-10-25 02:59:39
  • Multiple Updates
2024-10-23 02:58:52
  • Multiple Updates
2024-10-03 21:27:25
  • Multiple Updates
2024-09-30 17:27:26
  • Multiple Updates
2024-09-27 17:27:23
  • First insertion